WEB VAPT TOOLS COMPARISON Web Application VAPT is security testing methods for security holes or vulnerabilities in web applications and corporate websites. Due to these…
Network VAPT Tools Comparison
Network VAPT tools Comparison Network VAPT is the assessment procedure that is conducted by safety experts on the user’s network for identifying possible vulnerabilities that…
Patch management tricks and techniques
I. What is a patch? In technical terms, “Patch” are the changes performed on a computer program/software to enhance its security shield against newly rising…
Why HIPAA and GDPR cannot replace each other
Why HIPAA and GDPR cannot replace each other? Its a misconception that GDPR and HIPAA can replace each other. Many companies misconstrue both the compliances….
Is that mobile app safe to use?
Would you readily give your residential address to a stranger? No? Aren’t you extra cautious while opening an email from an unknown sender? Yes? Good!…
Cyber Security Webinar – Working From Home – For Senior Management
Cyber Security Tips – Working From Home For Senior Management Note – Enable sound – this video has an audio track.
Penetesting Industry 4.0 IoT Prototype – 5
Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video…
Penetesting Industry 4.0 IoT Prototype – 4
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes…
Penetesting Industry 4.0 IoT Prototype – 3
Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the…
Penetesting Industry 4.0 IoT Prototype – 2
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to…